scispace - formally typeset
Open AccessJournal ArticleDOI

Applying Visual Cryptography to Enhance Text Captchas

Xuehu Yan, +3 more
- Vol. 8, Iss: 3, pp 332
TLDR
Using the features of the randomness for each encoding process in visual cryptography and the visual recognizability with naked human eyes, VC is applied to design and enhance text-based captcha (VCETC), and the recognition rate is in some degree decreased.
Abstract
Nowadays, lots of applications and websites utilize text-based captchas to partially protect the authentication mechanism. However, in recent years, different ways have been exploited to automatically recognize text-based captchas especially deep learning-based ways, such as, convolutional neural network (CNN). Thus, we have to enhance the text captchas design. In this paper, using the features of the randomness for each encoding process in visual cryptography (VC) and the visual recognizability with naked human eyes, VC is applied to design and enhance text-based captcha. Experimental results using two typical deep learning-based attack models indicate the effectiveness of the designed method. By using our designed VC-enhanced text-based captcha (VCETC), the recognition rate is in some degree decreased.

read more

Citations
More filters
Journal ArticleDOI

Deep-CAPTCHA: A Deep Learning Based CAPTCHA Solver for Vulnerability Assessment

TL;DR: This research investigates a way to crack visual CAPTCHA tests by an automated deep learning based solution and identifies some efficient techniques to improve the security of the CAPTCHAs, based on the performance analysis conducted on the Deep-CAPTCHA model.
Posted Content

Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment.

TL;DR: This research investigates a way to crack visual CAPTCHA tests by an automated deep learning based solution and identifies some efficient techniques to improve the security of the CAPTCHAs, based on the performance analysis conducted on the Deep-CAPTCHA model.
Journal ArticleDOI

An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms

TL;DR: An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images that can reconstruct the secret images with only a series of XOR operations.
Journal ArticleDOI

Secure Online Voting System using Visual Cryptography

TL;DR: In this paper, a secure online voting system using visual cryptography is proposed, where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process.
Journal ArticleDOI

A Hybrid Visual Cryptography Method using Sigmoid Function for Security Enhancement in Gray Scale Images

TL;DR: This proposed HVMSF mainly tries to overcome the limitation of the previous approaches by applying sigmoid function in image feature space for contrast enhancement throughout the consequent source images.
References
More filters
Journal ArticleDOI

Gradient-based learning applied to document recognition

TL;DR: In this article, a graph transformer network (GTN) is proposed for handwritten character recognition, which can be used to synthesize a complex decision surface that can classify high-dimensional patterns, such as handwritten characters.
Journal ArticleDOI

reCAPTCHA: Human-Based Character Recognition via Web Security Measures

TL;DR: This research explored whether human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize.
Journal ArticleDOI

Telling humans and computers apart automatically

TL;DR: In this paper, lazy cryptographers do AI and show how lazy they can be, and how they do it well, and why they do so poorly, and they are lazy.
Journal ArticleDOI

Encryption of pictures and shapes by random grids.

Oded Kafri, +1 more
- 01 Jun 1987 - 
TL;DR: A low-cost and simple technique for encryption of two-dimensional patterns and shapes based on the superposition of random grids is suggested and demonstrated.
Journal ArticleDOI

Halftone Visual Cryptography Via Error Diffusion

TL;DR: HVC construction methods based on error diffusion are proposed, where the secret image is concurrently embedded into binary valued shares while these shares are halftoned by error diffusion-the workhorse standard of halftoning algorithms.
Related Papers (5)